Results 1 to 10 of about 6,315,248 (307)

Information Efficiency and Financial Stability [PDF]

open access: yesEconomics, 2010
AbstractThe authors study a simple model of an asset market with informed and non-informed agents. In the absence of non-informed agents, the market becomes information efficient when the number of traders with different private information is large enough.
Caccioli, Fabio, Marsili, Matteo
openaire   +9 more sources

Impacts and Losses Caused By the Fraudulent and Manipulated Financial Information on Economic Decisions [PDF]

open access: yesRevista de Management Comparat International, 2011
Nowadays the effects of the fraudulent and manipulated financial information have been more controversial. We should take into consideration that the financial losses caused by fraudulent or manipulated financial information are remarkable.
Tak ISA
doaj   +3 more sources

High-Speed Fault Attack Resistant Implementation of PIPO Block Cipher on ARM Cortex-A

open access: yesIEEE Access, 2021
In ICISC’20 conference, PIPO (Plug-In and Plug-Out) was proposed as an efficient block cipher for secure communication in IoT (Internet of Things) environment.
Jingyo Song   +2 more
doaj   +1 more source

Accelerating Falcon on ARMv8

open access: yesIEEE Access, 2022
Falcon is one of the promising digital-signature algorithms in NIST’s ongoing Post-Quantum Cryptography (PQC) standardization finalist. Computational efficiency regarding software and hardware is also the main criteria for PQC standardization.
Youngbeom Kim   +2 more
doaj   +1 more source

Accelerated implementation for testing IID assumption of NIST SP 800-90B using GPU [PDF]

open access: yesPeerJ Computer Science, 2021
In cryptosystems and cryptographic modules, insufficient entropy of the noise sources that serve as the input into random number generator (RNG) may cause serious damage, such as compromising private keys.
Yewon Kim, Yongjin Yeom
doaj   +2 more sources

Deep-Learning Based Nonprofiling Side-Channel Attack on Mask Leakage-Free Environments Using Broadcast Operation

open access: yesIEEE Access, 2023
With the recent development of artificial intelligence (AI), efforts to apply related technologies to various fields are rapidly increasing. In the field of cryptanalysis, research utilizing deep learning is continuously being published in order to keep ...
Seonghyuck Lim   +2 more
doaj   +1 more source

Deep-Learning-Based Side-Channel Analysis of Block Cipher PIPO With Bitslice Implementation

open access: yesIEEE Access, 2022
Recently, as deep learning has been applied to various fields, deep-learning-based side-channel analysis (SCA) has been widely investigated. Unlike traditional SCA, it can perform well independently of the attacker’s ability.
Ji-Eun Woo, Jaeseung Han, Dong-Guk Han
doaj   +1 more source

Single-Byte Error-Based Practical Differential Fault Attack on Bit-Sliced Lightweight Block Cipher PIPO

open access: yesIEEE Access, 2022
With the recent development of the Internet of Things (IoT), related device use is increasing rapidly. As a result, accessing and hijacking the devices is an increasing security threat.
Seonghyuck Lim   +2 more
doaj   +1 more source

Speeding Up LAT: Generating a Linear Approximation Table Using a Bitsliced Implementation

open access: yesIEEE Access, 2022
The substitution box (S-box) is one of the major components of cryptographic algorithms. An important issue for cryptographic algorithm designers in ensuring sufficient security from linear cryptanalysis, one of the most powerful attacks, is finding an S-
Giyoon Kim, Yongjin Jeon, Jongsung Kim
doaj   +1 more source

Generating Cryptographic S-Boxes Using the Reinforcement Learning

open access: yesIEEE Access, 2021
Substitution boxes (S-boxes) are essential components of many cryptographic primitives. The Dijkstra algorithm, SAT solvers, and heuristic methods have been used to find bitsliced implementations of S-boxes.
Giyoon Kim   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy